Virtual War (aka VWar) 1.6.1 R2 uses static session cookies that depend only on a user's password, which makes it easier for remote malicious users to bypass timeout and logout actions, and retain access for a long period of time, by leveraging knowledge of a session cookie.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
vwar virtual war 1.6.1 |